Summary

Completed

In this module, you learned about using Microsoft Sentinel to detect and investigate security threats in an environment. You practiced using rules and alerts to investigate and identify anomalies in Contoso's Azure Activity log.

You can now lead the IT team in helping Contoso protect its security environment by managing incidents with Microsoft Sentinel. Ongoing activities might include creating custom analytics rules, using playbooks for automated responses, and using workbooks to provide dashboards and visualizations.